ZyXEL V630 User Guide - Page 25

Table 81 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > STUN Server > STUN

Page 25 highlights

List of Tables Table 81 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > STUN Server > STUN Address ...89 Table 82 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > STUN Server > STUN Port ...90 Table 83 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy 91 Table 84 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy > Outbound Address ...91 Table 85 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy > Outbound Port ...92 Table 86 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > NAT Keep Alive 92 Table 87 Menu > Network > SIP Profiles > Add to Profile > Name > Expire 93 Table 88 Menu > Network > SIP Profiles > Add to Profile > Name > Code Order 93 Table 89 Menu > Network > Ping test ...94 Table 90 Menu > Network > Ping test > Manual 95 Table 91 Menu > Network > Ping test (In Progress 95 Table 92 Menu > Network > Re-connect 96 Table 93 Menu > Network > SIP Profiles > Add to Profile 98 Table 94 Call Options ...107 Table 95 Navigation Panel Summary 113 Table 96 Information Screen ...116 Table 97 Wireless Security Types ...118 Table 98 WLAN ...120 Table 99 Call Setting ...123 Table 100 Phone Book ...125 Table 101 Phone Book > Add ...126 Table 102 SIP Call Progression ...128 Table 103 SIP ...133 Table 104 Auto Provision ...135 Table 105 System > Password ...139 Table 106 Hardware Specifications ...147 Table 107 Firmware Specifications ...148 Table 108 Standards Supported ...149 Table 109 IEEE 802.11g ...181 Table 110 Wireless Security Levels ...182 Table 111 Comparison of EAP Authentication Types 185 Table 112 Wireless Security Relational Matrix 188 Table 113 IP Address Network Number and Host ID Example 198 Table 114 Subnet Masks ...199 Table 115 Maximum Host Numbers ...199 Table 116 Alternative Subnet Mask Notation 199 Table 117 Subnet 1 ...201 Table 118 Subnet 2 ...202 Table 119 Subnet 3 ...202 Table 120 Subnet 4 ...202 V630 User's Guide 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220

List of Tables
V630 User’s Guide
25
Table 81 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > STUN Server > STUN
Address
.......................................................................................................................
89
Table 82 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > STUN Server > STUN
Port
..............................................................................................................................
90
Table 83 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy
91
Table 84 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy >
Outbound Address
.......................................................................................................
91
Table 85 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > Outbound Proxy >
Outbound Port
.............................................................................................................
92
Table 86 Menu > Network > SIP Profiles > Add to Profile > Name > NAT traversal > NAT Keep Alive
92
Table 87 Menu > Network > SIP Profiles > Add to Profile > Name > Expire
.........................................
93
Table 88 Menu > Network > SIP Profiles > Add to Profile > Name > Code Order
.................................
93
Table 89 Menu > Network > Ping test
....................................................................................................
94
Table 90 Menu > Network > Ping test > Manual
....................................................................................
95
Table 91 Menu > Network > Ping test
(In Progress)
.............................................................................
95
Table 92 Menu > Network > Re-connect
...............................................................................................
96
Table 93 Menu > Network > SIP Profiles > Add to Profile
.....................................................................
98
Table 94 Call Options
..........................................................................................................................
107
Table 95 Navigation Panel Summary
...................................................................................................
113
Table 96 Information Screen
.................................................................................................................
116
Table 97 Wireless Security Types
.........................................................................................................
118
Table 98 WLAN
....................................................................................................................................
120
Table 99 Call Setting
............................................................................................................................
123
Table 100 Phone Book
........................................................................................................................
125
Table 101 Phone Book > Add
..............................................................................................................
126
Table 102 SIP Call Progression
...........................................................................................................
128
Table 103 SIP
......................................................................................................................................
133
Table 104 Auto Provision
.....................................................................................................................
135
Table 105 System > Password
............................................................................................................
139
Table 106 Hardware Specifications
.....................................................................................................
147
Table 107 Firmware Specifications
......................................................................................................
148
Table 108 Standards Supported
..........................................................................................................
149
Table 109 IEEE 802.11g
......................................................................................................................
181
Table 110 Wireless Security Levels
.....................................................................................................
182
Table 111 Comparison of EAP Authentication Types
...........................................................................
185
Table 112 Wireless Security Relational Matrix
.....................................................................................
188
Table 113 IP Address Network Number and Host ID Example
............................................................
198
Table 114 Subnet Masks
.....................................................................................................................
199
Table 115 Maximum Host Numbers
.....................................................................................................
199
Table 116 Alternative Subnet Mask Notation
.......................................................................................
199
Table 117 Subnet 1
..............................................................................................................................
201
Table 118 Subnet 2
..............................................................................................................................
202
Table 119 Subnet 3
..............................................................................................................................
202
Table 120 Subnet 4
..............................................................................................................................
202